Beruflich Dokumente
Kultur Dokumente
CT043-3-1
Wireless Networks
Learning Outcomes
At the end of this module, YOU should be able to:
Explain the advantages and disadvantages of WLANs.
Explain the standards and implementation of IEEE802 networks.
Explain the various radio frequency spectrum and bands of
operation.
Describe the standards and architecture of Bluetooth
technology.
Describe the considerations and implications of implementing
Bluetooth technology.
Describe the security aspects and techniques for Bluetooth
technology.
WLANs
Design goals
802.11
MAC address
Frequency spectrum
Frequency bands
ISM bands
Unlicensed bands
Introduction
The global goal of WLANs is to replace office cabling, to enable
connectionless access to the internet and to introduce a higher
flexibility for ad-hoc communication.
Some advantages of WLANs are:
Flexibility
Within radio coverage, nodes can communicate without further
restriction. Radio waves can penetrate walls, senders and
receivers can be placed anywhere.
Planning
Only wireless ad-hoc networks allow for communication without
previous planning, any wired network needs wiring plans.
Design
Wireless networks allow for the design of small, independent
devices which can for example be put into a pocket. Cables not
only restrict users but also designers of small PDAs, notepads
etc.
Robustness
Wireless networks can survive disasters or users pulling a plug.
Networks requiring a wired infrastructure will usually break down
completely.
Cost
After providing wireless access to the infrastructure via an
access point for the first user, adding additional users to a
wireless network will not increase the cost.
Bands of Operation
Bands of Operation
Bands of Operation
Frequency range
UHF ISM
902-928 MHz
S-Band
2-4 GHz
S-Band ISM
2.4-2.5 GHz
C-Band
4-8 GHz
3.7-4.2 GHz
5.25-5.925 GHz
C-Band ISM
5.725-5.875 GHz
5.925-6.425 GHz
X-Band
8-12 GHz
8.5-10.55 GHz
Ku-Band
12-18 GHz
Bands of Operation
Bands of Operation
Bluetooth
Introduction
Bluetooth
Bluetooth
User scenarios
Bluetooth
Bluetooth
Architecture
Bluetooth
Security
Bluetooth
PIN (1 16 byte)
User input
(initialization)
Pairing
E2
Link key (128 bit)
E2
Authentication
E3
Encryption key (128 bit)
Keystream generator
Payload key
Data
PIN (1 16 byte)
Cipher data
Ciphering
Payload key
Data
Bluetooth
Ciphering: The payload key is a stream of pseudorandom bits. The ciphering process is a simple XOR of
the user data and the payload key
cell
covers geographical
region
base station (BS)
analogous to 802.11
AP
mobile users attach
to network through
BS
air-interface: physical
and link layer protocol
between mobile and
BS
Public telephone
network, and
Internet
Mobile
Switching
Center
wired network
correspondent
wired public
telephone
network
MSC
MSC
MSC
MSC
MSC
Cellular Architecture
Allows the area to be broken into smaller cells
The mobile device then connects to the
closest cell
Cell
Cell
Cell
Cell
Cell
Cell
Cell
Cell
Cell
Cell
Cell
Cell
Cell
Cell
Cell
Cell
Frequency 900MHz
Cell
Cell
Cell
Cell
Cell
MHz
Cell
Frequency 900
Cell
Frequency 920
Cell
Frequency 940
Cell
Frequency 960
Cell
Cell
Cell
Cell
Cell
Cell
Cell
Cell
into
Q&A